Demonstrated understanding of the fundamental principles

Assignment Help Computer Engineering
Reference no: EM133689553

Fundamentals of Cyber Security

Case Study

Learning Outcome 1: Demonstrated understanding of the fundamental principles of cybersecurity and demonstrated capacity to interpret, apply, and evaluate the relevant security tools and approaches to identify and mitigate threats, attacks, and common vulnerabilities.

Learning Outcome 2: Demonstrated high level of written and verbal communication skills relevant to the planning, design, and implementation of a technical solution.

Anzaw Pty Ltd Case study

With its headquarters in Sydney and a branch in Brisbane, Anzaw Pty Ltd operates state-of-the-art automobile manufacturing lines. Using significant amounts of automation and advanced technology in its production lines, together with augmented reality for designing its cars of the future, Anzaw also embraces big data and artificial intelligence throughout its operations. Anzaw's organisational functions are world-class.

The headquarters' ICT Infrastructure is shown in Figure 1. The key servers used by Anzaw Pty Ltd are Web Server, Database Server and Mail Server. The purposes of these servers are:

Web Server: Hosts the Website of the Anzaw Pty Ltd
Database Server: Hosts the designs and manufacturing details of various cars
Mail Server: Used for receiving and sending emails

Anzaw Pty Ltd would like to take advantage of scalability and on-demand resources provided by Cloud Computing and are interested in adopting a Hybrid Cloud deployment model in the future.

Given the competitive nature of the automobile industry, and situated within a complex and dynamic external environment, Anzaw requires their production lines to be optimised continuously through the use of the latest cutting-edge hardware and software technology systems. In turn, these systems need to deliver not only high levels of work-flow but also high levels of information security. Information security is increasingly important as the company's technological vision and goals now extend to their automobiles through technological innovation and breakthroughs associated with using the Internet of Things (IoT). Indeed, Anzaw currently feels it is vulnerable to several types of malicious cyberattacks that aim to capture valuable business information in order to sell such information in the black market. Despite these dangers, the management at Anzaw has had little time to focus on areas of information security vulnerability. Therefore, they have hired you as an independent information security consultant to advise them on various aspects of information security issues and vulnerabilities.

Assuming the role of an independent information security consultant, use information given in the case study to answer the following questions.

Discuss the existing security landscape pertaining to information systems of Anzaw Pty Ltd, including common vulnerabilities, potential threats, and possible repercussions of a security breach.

Demonstrate your knowledge of important security tools such as authentication, access control, and cryptographic techniques that should be used within the Anzaw Pty Ltd to protect the information systems.

Analyse and explain various security technologies, scanning and probing tools that Anzaw Pty Ltd should use to master the best practices in protecting information.

Attachment:- Fundamentals of Cyber Security - Case Study.rar

Reference no: EM133689553

Questions Cloud

Coping mechanisms and mental health : Discuss the relationship between stress, coping mechanisms, and mental health.
How do financial planning and strategic planning influence : What role of financial planning in overall organizational strategic plan? How do financial planning and strategic planning influence health care organizations?
Explain how the regulatory environment : Explain how the regulatory environment and the regulations selected by your colleague differ from your state/region.
What were the results of your calculation : What were the results of your calculation? Show your work to the class, including the formula you used and the data you input for your calculation.
Demonstrated understanding of the fundamental principles : ICT 506 Fundamentals of Cyber Security, Sydney International School of Technology & Commerce - Demonstrated understanding of the fundamental principles
What is difficult ethical decisions you had to make : What is one of the more difficult ethical decisions you (or someone you know) had to make? Feel free to change the names and some details to ensure privacy.
Big data as part of clinical system : Post a description of at least one potential benefit of using big data as part of a clinical system and explain why.
Decreases in burnout for the current nurses : With these freshly new and young nurses, there will be decreases in burnout for the current nurses.
In what ways can you show christian compassion yet concern : While talking to him mentions he has recently broken up with his fiancée. In what ways can you show Christian compassion yet concern about his performance?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd